A form of social engineering that uses email
What is Phishing
When someone walks into a secured space behind you without badging in
What is Tailgating
The process of converting data into unreadable code to prevent unauthorized access
What is encryption?
The practice of manipulating people into divulging confidential information
What is social engineering?
This "Generation" is most vulnerable to cyber-attacks
What are Millennials?
A form of social engineering that uses text messaging
What is Smishing
Best place to go in your office during an earthquake
What is under a desk? (Doorways are no longer recommended in the office - at home it's OK)
A network of computers that have been infected with malware and are controlled by a single entity
What is a Botnet?
This weakest link in cybersecurity is often exploited by attackers
What are humans?
85% of people posting this type of photo online are trying to scam you
What are puppy photos?
What is Spear Phishing
Device anyone can use to help the victim of a heart attack
What is an AED or Automated External Defibrillator?
Most hackers are after this
What is money?
A video, image, or recording in which a persons face, image, or voice has been digitally altered so they appear to be someone else
What is a Deep Fake?
In 2011, MI6 took down bomb-making instructions from an online al-Qaeda magazine and replaced them with this
What are cupcake recipes?
Social engineering that targets executives
What is Whaling or Whale Phishing
The presence of this device alone can deter potential criminals
What is a camera?
This type of malware encrypts files and demands payment for their release
What is ransomware?
Someone secretly looks over your shoulder to see your PIN, password, or other sensitive information
What is shoulder surfing or screen snooping?
Hackers disabled computer systems at Düsseldorf University Hospital, leading to the first reported case of this
What is loss of life from a cyber-attack?
A form of social engineering where attackers use phone calls or voice messages to trick victims into revealing sensitive information
What is Vishing?
These systems regulate who can enter or exit a building often using keycards or biometric data to grant access
What are Access Control Systems (will also accept Badge Readers)
Compromising a smaller, less secure vendor to get to a larger company
What is a Supply Chain Attack?
This principle makes sure that employees only have access to data and systems necessary for their role
What is the Principle of Least Privilege (PoLP)?
Something fishy happened in Las Vegas when hackers accessed a casino's high-roller database through this
What is a smart fish tank?